Lookup for vulnerable packages by Package URL.

Purlpkg:conan/openssl@3.1.2
Typeconan
Namespace
Nameopenssl
Version3.1.2
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version3.2.6
Latest_non_vulnerable_version3.2.6
Affected_by_vulnerabilities
0
url VCID-2by2-tzdd-kkc7
vulnerability_id VCID-2by2-tzdd-kkc7
summary
Out-of-bounds Write
Issue summary: The POLY1305 MAC (message authentication code) implementation
contains a bug that might corrupt the internal state of applications running
on PowerPC CPU based platforms if the CPU provides vector instructions.

Impact summary: If an attacker can influence whether the POLY1305 MAC
algorithm is used, the application state might be corrupted with various
application dependent consequences.

The POLY1305 MAC (message authentication code) implementation in OpenSSL for
PowerPC CPUs restores the contents of vector registers in a different order
than they are saved. Thus the contents of some of these vector registers
are corrupted when returning to the caller. The vulnerable code is used only
on newer PowerPC processors supporting the PowerISA 2.07 instructions.

The consequences of this kind of internal application state corruption can
be various - from no consequences, if the calling application does not
depend on the contents of non-volatile XMM registers at all, to the worst
consequences, where the attacker could get complete control of the application
process. However unless the compiler uses the vector registers for storing
pointers, the most likely consequence, if any, would be an incorrect result
of some application dependent calculations or a crash leading to a denial of
service.

The POLY1305 MAC algorithm is most frequently used as part of the
CHACHA20-POLY1305 AEAD (authenticated encryption with associated data)
algorithm. The most common usage of this AEAD cipher is with TLS protocol
versions 1.2 and 1.3. If this cipher is enabled on the server a malicious
client can influence whether this AEAD cipher is used. This implies that
TLS server applications using OpenSSL can be potentially impacted. However
we are currently not aware of any concrete application that would be affected
by this issue therefore we consider this a Low severity security issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6129.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6129.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6129
reference_id
reference_type
scores
0
value 0.02502
scoring_system epss
scoring_elements 0.85285
published_at 2026-04-02T12:55:00Z
1
value 0.02502
scoring_system epss
scoring_elements 0.85349
published_at 2026-04-11T12:55:00Z
2
value 0.02502
scoring_system epss
scoring_elements 0.85336
published_at 2026-04-09T12:55:00Z
3
value 0.02502
scoring_system epss
scoring_elements 0.85348
published_at 2026-04-12T12:55:00Z
4
value 0.02502
scoring_system epss
scoring_elements 0.85344
published_at 2026-04-13T12:55:00Z
5
value 0.02502
scoring_system epss
scoring_elements 0.85364
published_at 2026-04-16T12:55:00Z
6
value 0.02502
scoring_system epss
scoring_elements 0.85366
published_at 2026-04-18T12:55:00Z
7
value 0.02502
scoring_system epss
scoring_elements 0.85386
published_at 2026-04-24T12:55:00Z
8
value 0.02502
scoring_system epss
scoring_elements 0.85395
published_at 2026-04-26T12:55:00Z
9
value 0.02502
scoring_system epss
scoring_elements 0.85394
published_at 2026-04-29T12:55:00Z
10
value 0.02502
scoring_system epss
scoring_elements 0.85408
published_at 2026-05-05T12:55:00Z
11
value 0.02502
scoring_system epss
scoring_elements 0.85435
published_at 2026-05-07T12:55:00Z
12
value 0.02502
scoring_system epss
scoring_elements 0.85452
published_at 2026-05-09T12:55:00Z
13
value 0.02502
scoring_system epss
scoring_elements 0.85448
published_at 2026-05-11T12:55:00Z
14
value 0.02502
scoring_system epss
scoring_elements 0.85303
published_at 2026-04-04T12:55:00Z
15
value 0.02502
scoring_system epss
scoring_elements 0.85305
published_at 2026-04-07T12:55:00Z
16
value 0.02502
scoring_system epss
scoring_elements 0.85327
published_at 2026-04-08T12:55:00Z
17
value 0.0257
scoring_system epss
scoring_elements 0.85565
published_at 2026-04-21T12:55:00Z
18
value 0.03331
scoring_system epss
scoring_elements 0.87416
published_at 2026-05-14T12:55:00Z
19
value 0.03331
scoring_system epss
scoring_elements 0.87382
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6129
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/openssl/openssl/commit/050d26383d4e264966fb83428e72d5d48f402d35
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-22T14:31:57Z/
url https://github.com/openssl/openssl/commit/050d26383d4e264966fb83428e72d5d48f402d35
4
reference_url https://github.com/openssl/openssl/commit/5b139f95c9a47a55a0c54100f3837b1eee942b04
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-22T14:31:57Z/
url https://github.com/openssl/openssl/commit/5b139f95c9a47a55a0c54100f3837b1eee942b04
5
reference_url https://github.com/openssl/openssl/commit/f3fc5808fe9ff74042d639839610d03b8fdcc015
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-22T14:31:57Z/
url https://github.com/openssl/openssl/commit/f3fc5808fe9ff74042d639839610d03b8fdcc015
6
reference_url https://www.openssl.org/news/secadv/20240109.txt
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-22T14:31:57Z/
url https://www.openssl.org/news/secadv/20240109.txt
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1060347
reference_id 1060347
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1060347
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257571
reference_id 2257571
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2257571
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-6129
reference_id CVE-2023-6129
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-6129
10
reference_url https://access.redhat.com/errata/RHSA-2024:2447
reference_id RHSA-2024:2447
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2447
11
reference_url https://access.redhat.com/errata/RHSA-2024:9088
reference_id RHSA-2024:9088
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9088
12
reference_url https://usn.ubuntu.com/6622-1/
reference_id USN-6622-1
reference_type
scores
url https://usn.ubuntu.com/6622-1/
fixed_packages
0
url pkg:conan/openssl@3.1.5
purl pkg:conan/openssl@3.1.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:conan/openssl@3.1.5
1
url pkg:conan/openssl@3.2.1
purl pkg:conan/openssl@3.2.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:conan/openssl@3.2.1
2
url pkg:conan/openssl@3.2.6
purl pkg:conan/openssl@3.2.6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:conan/openssl@3.2.6
aliases CVE-2023-6129
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2by2-tzdd-kkc7
1
url VCID-h6n1-tsqt-17bw
vulnerability_id VCID-h6n1-tsqt-17bw
summary
Generation of Weak Initialization Vector (IV)
Issue summary: A bug has been identified in the processing of key and
initialisation vector (IV) lengths. This can lead to potential truncation
or overruns during the initialisation of some symmetric ciphers.

Impact summary: A truncation in the IV can result in non-uniqueness,
which could result in loss of confidentiality for some cipher modes.

When calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or
EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after
the key and IV have been established. Any alterations to the key length,
via the "keylen" parameter or the IV length, via the "ivlen" parameter,
within the OSSL_PARAM array will not take effect as intended, potentially
causing truncation or overreading of these values. The following ciphers
and cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB.

For the CCM, GCM and OCB cipher modes, truncation of the IV can result in
loss of confidentiality. For example, when following NIST's SP 800-38D
section 8.2.1 guidance for constructing a deterministic IV for AES in
GCM mode, truncation of the counter portion could lead to IV reuse.

Both truncations and overruns of the key and overruns of the IV will
produce incorrect results and could, in some cases, trigger a memory
exception. However, these issues are not currently assessed as security
critical.

Changing the key and/or IV lengths is not considered to be a common operation
and the vulnerable API was recently introduced. Furthermore it is likely that
application developers will have spotted this problem during testing since
decryption would fail unless both peers in the communication were similarly
vulnerable. For these reasons we expect the probability of an application being
vulnerable to this to be quite low. However if an application is vulnerable then
this issue is considered very serious. For these reasons we have assessed this
issue as Moderate severity overall.

The OpenSSL SSL/TLS implementation is not affected by this issue.

The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this because
the issue lies outside of the FIPS provider boundary.

OpenSSL 3.1 and 3.0 is vulnerable to this issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5363.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5363.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5363
reference_id
reference_type
scores
0
value 0.04745
scoring_system epss
scoring_elements 0.89425
published_at 2026-04-11T12:55:00Z
1
value 0.04745
scoring_system epss
scoring_elements 0.89383
published_at 2026-04-02T12:55:00Z
2
value 0.04745
scoring_system epss
scoring_elements 0.89394
published_at 2026-04-04T12:55:00Z
3
value 0.04745
scoring_system epss
scoring_elements 0.89396
published_at 2026-04-07T12:55:00Z
4
value 0.04745
scoring_system epss
scoring_elements 0.89412
published_at 2026-04-08T12:55:00Z
5
value 0.04745
scoring_system epss
scoring_elements 0.89416
published_at 2026-04-09T12:55:00Z
6
value 0.04745
scoring_system epss
scoring_elements 0.89423
published_at 2026-04-12T12:55:00Z
7
value 0.04745
scoring_system epss
scoring_elements 0.89419
published_at 2026-04-13T12:55:00Z
8
value 0.04745
scoring_system epss
scoring_elements 0.89434
published_at 2026-04-16T12:55:00Z
9
value 0.04745
scoring_system epss
scoring_elements 0.89435
published_at 2026-04-18T12:55:00Z
10
value 0.04745
scoring_system epss
scoring_elements 0.89448
published_at 2026-04-24T12:55:00Z
11
value 0.04745
scoring_system epss
scoring_elements 0.89452
published_at 2026-04-26T12:55:00Z
12
value 0.04745
scoring_system epss
scoring_elements 0.89454
published_at 2026-04-29T12:55:00Z
13
value 0.04745
scoring_system epss
scoring_elements 0.89462
published_at 2026-05-05T12:55:00Z
14
value 0.0487
scoring_system epss
scoring_elements 0.89614
published_at 2026-05-07T12:55:00Z
15
value 0.0487
scoring_system epss
scoring_elements 0.89623
published_at 2026-05-11T12:55:00Z
16
value 0.0487
scoring_system epss
scoring_elements 0.89627
published_at 2026-05-09T12:55:00Z
17
value 0.0487
scoring_system epss
scoring_elements 0.89569
published_at 2026-04-21T12:55:00Z
18
value 0.06469
scoring_system epss
scoring_elements 0.91174
published_at 2026-05-14T12:55:00Z
19
value 0.06469
scoring_system epss
scoring_elements 0.91163
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5363
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=0df40630850fb2740e6be6890bb905d3fc623b2d
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:15:36Z/
url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=0df40630850fb2740e6be6890bb905d3fc623b2d
4
reference_url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=5f69f5c65e483928c4b28ed16af6e5742929f1ee
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:15:36Z/
url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=5f69f5c65e483928c4b28ed16af6e5742929f1ee
5
reference_url https://security.netapp.com/advisory/ntap-20231027-0010/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20231027-0010/
6
reference_url https://www.debian.org/security/2023/dsa-5532
reference_id
reference_type
scores
url https://www.debian.org/security/2023/dsa-5532
7
reference_url https://www.openssl.org/news/secadv/20231024.txt
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:15:36Z/
url https://www.openssl.org/news/secadv/20231024.txt
8
reference_url http://www.openwall.com/lists/oss-security/2023/10/24/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2023/10/24/1
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2243839
reference_id 2243839
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2243839
10
reference_url https://security.archlinux.org/AVG-2848
reference_id AVG-2848
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2848
11
reference_url https://security.archlinux.org/AVG-2849
reference_id AVG-2849
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2849
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-5363
reference_id CVE-2023-5363
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-5363
13
reference_url https://access.redhat.com/errata/RHSA-2024:0310
reference_id RHSA-2024:0310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0310
14
reference_url https://access.redhat.com/errata/RHSA-2024:0500
reference_id RHSA-2024:0500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0500
15
reference_url https://access.redhat.com/errata/RHSA-2024:1383
reference_id RHSA-2024:1383
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1383
16
reference_url https://access.redhat.com/errata/RHSA-2024:2094
reference_id RHSA-2024:2094
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2094
17
reference_url https://usn.ubuntu.com/6450-1/
reference_id USN-6450-1
reference_type
scores
url https://usn.ubuntu.com/6450-1/
fixed_packages
0
url pkg:conan/openssl@3.1.4
purl pkg:conan/openssl@3.1.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2by2-tzdd-kkc7
resource_url http://public2.vulnerablecode.io/packages/pkg:conan/openssl@3.1.4
1
url pkg:conan/openssl@3.2.6
purl pkg:conan/openssl@3.2.6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:conan/openssl@3.2.6
aliases CVE-2023-5363
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h6n1-tsqt-17bw
2
url VCID-sn5k-3e59-7ba8
vulnerability_id VCID-sn5k-3e59-7ba8
summary
Improper Check for Unusual or Exceptional Conditions
Issue summary: Generating excessively long X9.42 DH keys or checking
excessively long X9.42 DH keys or parameters may be very slow.

Impact summary: Applications that use the functions DH_generate_key() to
generate an X9.42 DH key may experience long delays. Likewise, applications
that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check()
to check an X9.42 DH key or X9.42 DH parameters may experience long delays.
Where the key or parameters that are being checked have been obtained from
an untrusted source this may lead to a Denial of Service.

While DH_check() performs all the necessary checks (as of CVE-2023-3817),
DH_check_pub_key() does not make any of these checks, and is therefore
vulnerable for excessively large P and Q parameters.

Likewise, while DH_generate_key() performs a check for an excessively large
P, it does not check for an excessively large Q.

An application that calls DH_generate_key() or DH_check_pub_key() and
supplies a key or parameters obtained from an untrusted source could be
vulnerable to a Denial of Service attack.

DH_generate_key() and DH_check_pub_key() are also called by a number of
other OpenSSL functions. An application calling any of those other
functions may similarly be affected. The other functions affected by this
are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate().

Also vulnerable are the OpenSSL pkey command line application when using the
"-pubcheck" option, as well as the OpenSSL genpkey command line application.

The OpenSSL SSL/TLS implementation is not affected by this issue.

The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5678.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5678.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5678
reference_id
reference_type
scores
0
value 0.00537
scoring_system epss
scoring_elements 0.67669
published_at 2026-05-14T12:55:00Z
1
value 0.00537
scoring_system epss
scoring_elements 0.67609
published_at 2026-05-12T12:55:00Z
2
value 0.00638
scoring_system epss
scoring_elements 0.70583
published_at 2026-04-26T12:55:00Z
3
value 0.00638
scoring_system epss
scoring_elements 0.70482
published_at 2026-04-08T12:55:00Z
4
value 0.00638
scoring_system epss
scoring_elements 0.70498
published_at 2026-04-09T12:55:00Z
5
value 0.00638
scoring_system epss
scoring_elements 0.70573
published_at 2026-04-24T12:55:00Z
6
value 0.00638
scoring_system epss
scoring_elements 0.70523
published_at 2026-04-21T12:55:00Z
7
value 0.00638
scoring_system epss
scoring_elements 0.70543
published_at 2026-04-18T12:55:00Z
8
value 0.00638
scoring_system epss
scoring_elements 0.70535
published_at 2026-04-16T12:55:00Z
9
value 0.00638
scoring_system epss
scoring_elements 0.70492
published_at 2026-04-13T12:55:00Z
10
value 0.00638
scoring_system epss
scoring_elements 0.70507
published_at 2026-04-12T12:55:00Z
11
value 0.00638
scoring_system epss
scoring_elements 0.70522
published_at 2026-04-11T12:55:00Z
12
value 0.00638
scoring_system epss
scoring_elements 0.70598
published_at 2026-05-11T12:55:00Z
13
value 0.00656
scoring_system epss
scoring_elements 0.70953
published_at 2026-04-02T12:55:00Z
14
value 0.00656
scoring_system epss
scoring_elements 0.7097
published_at 2026-04-04T12:55:00Z
15
value 0.00656
scoring_system epss
scoring_elements 0.70945
published_at 2026-04-07T12:55:00Z
16
value 0.00656
scoring_system epss
scoring_elements 0.71089
published_at 2026-04-29T12:55:00Z
17
value 0.00656
scoring_system epss
scoring_elements 0.71071
published_at 2026-05-05T12:55:00Z
18
value 0.00656
scoring_system epss
scoring_elements 0.7111
published_at 2026-05-07T12:55:00Z
19
value 0.00656
scoring_system epss
scoring_elements 0.71147
published_at 2026-05-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5678
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5678
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5678
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=34efaef6c103d636ab507a0cc34dca4d3aecc055
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T19:42:37Z/
url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=34efaef6c103d636ab507a0cc34dca4d3aecc055
5
reference_url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=710fee740904b6290fef0dd5536fbcedbc38ff0c
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T19:42:37Z/
url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=710fee740904b6290fef0dd5536fbcedbc38ff0c
6
reference_url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=db925ae2e65d0d925adef429afc37f75bd1c2017
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T19:42:37Z/
url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=db925ae2e65d0d925adef429afc37f75bd1c2017
7
reference_url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ddeb4b6c6d527e54ce9a99cba785c0f7776e54b6
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T19:42:37Z/
url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ddeb4b6c6d527e54ce9a99cba785c0f7776e54b6
8
reference_url https://www.openssl.org/news/secadv/20231106.txt
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T19:42:37Z/
url https://www.openssl.org/news/secadv/20231106.txt
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055473
reference_id 1055473
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055473
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2248616
reference_id 2248616
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2248616
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-5678
reference_id CVE-2023-5678
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-5678
12
reference_url https://access.redhat.com/errata/RHSA-2023:7877
reference_id RHSA-2023:7877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7877
13
reference_url https://access.redhat.com/errata/RHSA-2024:0154
reference_id RHSA-2024:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0154
14
reference_url https://access.redhat.com/errata/RHSA-2024:0208
reference_id RHSA-2024:0208
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0208
15
reference_url https://access.redhat.com/errata/RHSA-2024:1316
reference_id RHSA-2024:1316
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1316
16
reference_url https://access.redhat.com/errata/RHSA-2024:1317
reference_id RHSA-2024:1317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1317
17
reference_url https://access.redhat.com/errata/RHSA-2024:1318
reference_id RHSA-2024:1318
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1318
18
reference_url https://access.redhat.com/errata/RHSA-2024:1319
reference_id RHSA-2024:1319
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1319
19
reference_url https://access.redhat.com/errata/RHSA-2024:1325
reference_id RHSA-2024:1325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1325
20
reference_url https://access.redhat.com/errata/RHSA-2024:2447
reference_id RHSA-2024:2447
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2447
21
reference_url https://usn.ubuntu.com/6622-1/
reference_id USN-6622-1
reference_type
scores
url https://usn.ubuntu.com/6622-1/
22
reference_url https://usn.ubuntu.com/6632-1/
reference_id USN-6632-1
reference_type
scores
url https://usn.ubuntu.com/6632-1/
23
reference_url https://usn.ubuntu.com/6709-1/
reference_id USN-6709-1
reference_type
scores
url https://usn.ubuntu.com/6709-1/
24
reference_url https://usn.ubuntu.com/7894-1/
reference_id USN-7894-1
reference_type
scores
url https://usn.ubuntu.com/7894-1/
fixed_packages
0
url pkg:conan/openssl@3.1.5
purl pkg:conan/openssl@3.1.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:conan/openssl@3.1.5
1
url pkg:conan/openssl@3.2.6
purl pkg:conan/openssl@3.2.6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:conan/openssl@3.2.6
aliases CVE-2023-5678
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sn5k-3e59-7ba8
3
url VCID-t4t8-753w-zqc5
vulnerability_id VCID-t4t8-753w-zqc5
summary
POLY1305 MAC implementation corrupts XMM registers on Windows
Issue summary: The POLY1305 MAC (message authentication code) implementation
contains a bug that might corrupt the internal state of applications on the
Windows 64 platform when running on newer X86_64 processors supporting the
AVX512-IFMA instructions.

Impact summary: If in an application that uses the OpenSSL library an attacker
can influence whether the POLY1305 MAC algorithm is used, the application
state might be corrupted with various application dependent consequences.

The POLY1305 MAC (message authentication code) implementation in OpenSSL does
not save the contents of non-volatile XMM registers on Windows 64 platform
when calculating the MAC of data larger than 64 bytes. Before returning to
the caller all the XMM registers are set to zero rather than restoring their
previous content. The vulnerable code is used only on newer x86_64 processors
supporting the AVX512-IFMA instructions.

The consequences of this kind of internal application state corruption can
be various - from no consequences, if the calling application does not
depend on the contents of non-volatile XMM registers at all, to the worst
consequences, where the attacker could get complete control of the application
process. However given the contents of the registers are just zeroized so
the attacker cannot put arbitrary values inside, the most likely consequence,
if any, would be an incorrect result of some application dependent
calculations or a crash leading to a denial of service.

The POLY1305 MAC algorithm is most frequently used as part of the
CHACHA20-POLY1305 AEAD (authenticated encryption with associated data)
algorithm. The most common usage of this AEAD cipher is with TLS protocol
versions 1.2 and 1.3 and a malicious client can influence whether this AEAD
cipher is used by the server. This implies that server applications using
OpenSSL can be potentially impacted. However we are currently not aware of
any concrete application that would be affected by this issue therefore we
consider this a Low severity security issue.

As a workaround the AVX512-IFMA instructions support can be disabled at
runtime by setting the environment variable OPENSSL_ia32cap:

  OPENSSL_ia32cap=:~0x200000

The FIPS provider is not affected by this issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4807.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4807.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4807
reference_id
reference_type
scores
0
value 0.00675
scoring_system epss
scoring_elements 0.71652
published_at 2026-05-14T12:55:00Z
1
value 0.00675
scoring_system epss
scoring_elements 0.71479
published_at 2026-04-21T12:55:00Z
2
value 0.00675
scoring_system epss
scoring_elements 0.71515
published_at 2026-04-24T12:55:00Z
3
value 0.00675
scoring_system epss
scoring_elements 0.71522
published_at 2026-04-26T12:55:00Z
4
value 0.00675
scoring_system epss
scoring_elements 0.71513
published_at 2026-05-05T12:55:00Z
5
value 0.00675
scoring_system epss
scoring_elements 0.71563
published_at 2026-05-07T12:55:00Z
6
value 0.00675
scoring_system epss
scoring_elements 0.71598
published_at 2026-05-09T12:55:00Z
7
value 0.00675
scoring_system epss
scoring_elements 0.71564
published_at 2026-05-11T12:55:00Z
8
value 0.00675
scoring_system epss
scoring_elements 0.71594
published_at 2026-05-12T12:55:00Z
9
value 0.0082
scoring_system epss
scoring_elements 0.74364
published_at 2026-04-04T12:55:00Z
10
value 0.0082
scoring_system epss
scoring_elements 0.74338
published_at 2026-04-07T12:55:00Z
11
value 0.0082
scoring_system epss
scoring_elements 0.74371
published_at 2026-04-08T12:55:00Z
12
value 0.0082
scoring_system epss
scoring_elements 0.74386
published_at 2026-04-09T12:55:00Z
13
value 0.0082
scoring_system epss
scoring_elements 0.74407
published_at 2026-04-11T12:55:00Z
14
value 0.0082
scoring_system epss
scoring_elements 0.74387
published_at 2026-04-12T12:55:00Z
15
value 0.0082
scoring_system epss
scoring_elements 0.74379
published_at 2026-04-13T12:55:00Z
16
value 0.0082
scoring_system epss
scoring_elements 0.74416
published_at 2026-04-16T12:55:00Z
17
value 0.0082
scoring_system epss
scoring_elements 0.74425
published_at 2026-04-18T12:55:00Z
18
value 0.0082
scoring_system epss
scoring_elements 0.74337
published_at 2026-04-02T12:55:00Z
19
value 0.0085
scoring_system epss
scoring_elements 0.74952
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4807
2
reference_url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=4bfac4471f53c4f74c8d81020beb938f92d84ca5
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/
url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=4bfac4471f53c4f74c8d81020beb938f92d84ca5
3
reference_url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6754de4a121ec7f261b16723180df6592cbb4508
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/
url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6754de4a121ec7f261b16723180df6592cbb4508
4
reference_url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a632d534c73eeb3e3db8c7540d811194ef7c79ff
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/
url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a632d534c73eeb3e3db8c7540d811194ef7c79ff
5
reference_url https://security.netapp.com/advisory/ntap-20230921-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20230921-0001/
6
reference_url https://www.openssl.org/news/secadv/20230908.txt
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/
url https://www.openssl.org/news/secadv/20230908.txt
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2238009
reference_id 2238009
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2238009
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-4807
reference_id CVE-2023-4807
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-4807
fixed_packages
0
url pkg:conan/openssl@3.2.6
purl pkg:conan/openssl@3.2.6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:conan/openssl@3.2.6
aliases CVE-2023-4807
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t4t8-753w-zqc5
Fixing_vulnerabilities
0
url VCID-vhkt-tbz6-wuf7
vulnerability_id VCID-vhkt-tbz6-wuf7
summary
Inefficient Regular Expression Complexity
Issue summary: Checking excessively long DH keys or parameters may be very slow.

Impact summary: Applications that use the functions DH_check(), DH_check_ex()
or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long
delays. Where the key or parameters that are being checked have been obtained
from an untrusted source this may lead to a Denial of Service.

The function DH_check() performs various checks on DH parameters. One of those
checks confirms that the modulus ('p' parameter) is not too large. Trying to use
a very large modulus is slow and OpenSSL will not normally use a modulus which
is over 10,000 bits in length.

However the DH_check() function checks numerous aspects of the key or parameters
that have been supplied. Some of those checks use the supplied modulus value
even if it has already been found to be too large.

An application that calls DH_check() and supplies a key or parameters obtained
from an untrusted source could be vulernable to a Denial of Service attack.

The function DH_check() is itself called by a number of other OpenSSL functions.
An application calling any of those other functions may similarly be affected.
The other functions affected by this are DH_check_ex() and
EVP_PKEY_param_check().

Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications
when using the '-check' option.

The OpenSSL SSL/TLS implementation is not affected by this issue.
The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3446.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3446.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3446
reference_id
reference_type
scores
0
value 0.00937
scoring_system epss
scoring_elements 0.76138
published_at 2026-04-02T12:55:00Z
1
value 0.00937
scoring_system epss
scoring_elements 0.76395
published_at 2026-05-14T12:55:00Z
2
value 0.00937
scoring_system epss
scoring_elements 0.76237
published_at 2026-04-16T12:55:00Z
3
value 0.00937
scoring_system epss
scoring_elements 0.76242
published_at 2026-04-18T12:55:00Z
4
value 0.00937
scoring_system epss
scoring_elements 0.76224
published_at 2026-04-21T12:55:00Z
5
value 0.00937
scoring_system epss
scoring_elements 0.76262
published_at 2026-04-24T12:55:00Z
6
value 0.00937
scoring_system epss
scoring_elements 0.76271
published_at 2026-04-26T12:55:00Z
7
value 0.00937
scoring_system epss
scoring_elements 0.76284
published_at 2026-04-29T12:55:00Z
8
value 0.00937
scoring_system epss
scoring_elements 0.76294
published_at 2026-05-05T12:55:00Z
9
value 0.00937
scoring_system epss
scoring_elements 0.76323
published_at 2026-05-07T12:55:00Z
10
value 0.00937
scoring_system epss
scoring_elements 0.76343
published_at 2026-05-09T12:55:00Z
11
value 0.00937
scoring_system epss
scoring_elements 0.7633
published_at 2026-05-11T12:55:00Z
12
value 0.00937
scoring_system epss
scoring_elements 0.76345
published_at 2026-05-12T12:55:00Z
13
value 0.00937
scoring_system epss
scoring_elements 0.76171
published_at 2026-04-04T12:55:00Z
14
value 0.00937
scoring_system epss
scoring_elements 0.76151
published_at 2026-04-07T12:55:00Z
15
value 0.00937
scoring_system epss
scoring_elements 0.76184
published_at 2026-04-08T12:55:00Z
16
value 0.00937
scoring_system epss
scoring_elements 0.76197
published_at 2026-04-09T12:55:00Z
17
value 0.00937
scoring_system epss
scoring_elements 0.76222
published_at 2026-04-11T12:55:00Z
18
value 0.00937
scoring_system epss
scoring_elements 0.76198
published_at 2026-04-12T12:55:00Z
19
value 0.00937
scoring_system epss
scoring_elements 0.76196
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3446
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3446
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3446
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1fa20cf2f506113c761777127a38bce5068740eb
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:22Z/
url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1fa20cf2f506113c761777127a38bce5068740eb
5
reference_url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8780a896543a654e757db1b9396383f9d8095528
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:22Z/
url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8780a896543a654e757db1b9396383f9d8095528
6
reference_url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:22Z/
url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c
7
reference_url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fc9867c1e03c22ebf56943be205202e576aabf23
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:22Z/
url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fc9867c1e03c22ebf56943be205202e576aabf23
8
reference_url https://www.openssl.org/news/secadv/20230719.txt
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:22Z/
url https://www.openssl.org/news/secadv/20230719.txt
9
reference_url http://www.openwall.com/lists/oss-security/2023/07/19/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2023/07/19/4
10
reference_url http://www.openwall.com/lists/oss-security/2023/07/19/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2023/07/19/5
11
reference_url http://www.openwall.com/lists/oss-security/2023/07/19/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2023/07/19/6
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041817
reference_id 1041817
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041817
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2224962
reference_id 2224962
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2224962
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-3446
reference_id CVE-2023-3446
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-3446
15
reference_url https://access.redhat.com/errata/RHSA-2023:7622
reference_id RHSA-2023:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7622
16
reference_url https://access.redhat.com/errata/RHSA-2023:7623
reference_id RHSA-2023:7623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7623
17
reference_url https://access.redhat.com/errata/RHSA-2023:7625
reference_id RHSA-2023:7625
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7625
18
reference_url https://access.redhat.com/errata/RHSA-2023:7626
reference_id RHSA-2023:7626
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7626
19
reference_url https://access.redhat.com/errata/RHSA-2023:7877
reference_id RHSA-2023:7877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7877
20
reference_url https://access.redhat.com/errata/RHSA-2024:0154
reference_id RHSA-2024:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0154
21
reference_url https://access.redhat.com/errata/RHSA-2024:0208
reference_id RHSA-2024:0208
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0208
22
reference_url https://access.redhat.com/errata/RHSA-2024:0408
reference_id RHSA-2024:0408
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0408
23
reference_url https://access.redhat.com/errata/RHSA-2024:0888
reference_id RHSA-2024:0888
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0888
24
reference_url https://access.redhat.com/errata/RHSA-2024:1415
reference_id RHSA-2024:1415
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1415
25
reference_url https://access.redhat.com/errata/RHSA-2024:2264
reference_id RHSA-2024:2264
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2264
26
reference_url https://access.redhat.com/errata/RHSA-2024:2447
reference_id RHSA-2024:2447
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2447
27
reference_url https://usn.ubuntu.com/6435-1/
reference_id USN-6435-1
reference_type
scores
url https://usn.ubuntu.com/6435-1/
28
reference_url https://usn.ubuntu.com/6435-2/
reference_id USN-6435-2
reference_type
scores
url https://usn.ubuntu.com/6435-2/
29
reference_url https://usn.ubuntu.com/6450-1/
reference_id USN-6450-1
reference_type
scores
url https://usn.ubuntu.com/6450-1/
30
reference_url https://usn.ubuntu.com/6709-1/
reference_id USN-6709-1
reference_type
scores
url https://usn.ubuntu.com/6709-1/
31
reference_url https://usn.ubuntu.com/7018-1/
reference_id USN-7018-1
reference_type
scores
url https://usn.ubuntu.com/7018-1/
32
reference_url https://usn.ubuntu.com/7894-1/
reference_id USN-7894-1
reference_type
scores
url https://usn.ubuntu.com/7894-1/
fixed_packages
0
url pkg:conan/openssl@1.1.1w
purl pkg:conan/openssl@1.1.1w
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:conan/openssl@1.1.1w
1
url pkg:conan/openssl@3.1.2
purl pkg:conan/openssl@3.1.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2by2-tzdd-kkc7
1
vulnerability VCID-h6n1-tsqt-17bw
2
vulnerability VCID-sn5k-3e59-7ba8
3
vulnerability VCID-t4t8-753w-zqc5
resource_url http://public2.vulnerablecode.io/packages/pkg:conan/openssl@3.1.2
2
url pkg:conan/openssl@3.1.3
purl pkg:conan/openssl@3.1.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:conan/openssl@3.1.3
aliases CVE-2023-3446
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vhkt-tbz6-wuf7
Risk_score3.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:conan/openssl@3.1.2